Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework

被引:0
|
作者
Tsai, Chia-Cheng [1 ]
Lin, Cheng-Chieh [2 ]
Liao, Shih-Wei [1 ]
机构
[1] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
来源
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN | 2023年
关键词
decentralized autonomous organization; flash; loan; governance attack;
D O I
10.1109/Blockchain60715.2023.00034
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Decentralized Autonomous Organizations (DAOs) have emerged as blockchain technology evolves beyond cryptocurrencies. Despite being the first project in this ecosystem, The l)AO encountered a significant exploit due to inadequate implementation; nevertheless, it still paved the way for future projects. While decentralized autonomous organizations continue to thrive, there is a shortage of academic papers analyzing the associated risks. Therefore, this paper aims to comprehensively examine the current vulnerabilities in these organizations by systematically analyzing past attack incidents. 54 real -world events spanning from 2016 to July 2023 have been collected for identifying and summarizing major attack vectors. The results showcase that flash loan attacks, oracle manipulation, governance takeovers, and reentrancy issues are the critical vulnerabilities within this field. For further protection, this research also provides both general and specific countermeasures against each vulnerability, serving as an evaluation framework for both existing and future projects.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [21] Unveiling crypto analysis secrets : A comprehensive analysis of smart contract security within blockchain network environments
    Vats, Prashant
    Vats, Shailender Kumar
    Peddi, Prasadu
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1121 - 1128
  • [22] Big Data: Hadoop framework vulnerabilities, security issues and attacks
    Bhathal, Gurjit Singh
    Singh, Amardeep
    ARRAY, 2019, 1-2
  • [23] A New Framework of Security Vulnerabilities Detection in PHP Web Application
    Zhao, Jingling
    Gong, Rulin
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 271 - 276
  • [24] Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis
    Xiao, Haitao
    Zhu, Yan
    Zhang, Bin
    Lu, Zhigang
    Du, Dan
    Liu, Yuling
    COMPUTERS & SECURITY, 2024, 138
  • [25] Security Analysis of DeFi: Vulnerabilities, Attacks and Advances
    Li, Wenkai
    Bu, Jiuyang
    Li, Xiaoqi
    Chen, Xianyi
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 488 - 493
  • [26] Hybrid Analysis Of Executables To Detect Security Vulnerabilities
    Kumar, Pranith D.
    Nema, Anchal
    Kumar, Rajeev
    ISEC 2009 - PROCEEDINGS OF THE 2ND INDIA SOFTWARE ENGINEERING CONFERENCE, 2009, : 141 - 142
  • [27] Analysis and Prevention of Security Vulnerabilities in a Smart City
    Lupton, Ben
    Zappe, Mackenzie
    Thom, Jay
    Sengupta, Shamik
    Feil-Seifer, Dave
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 702 - 708
  • [28] An analysis of mobile WiMAX security: Vulnerabilities and solutions
    Shon, Taeshik
    Choi, Wook
    NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2007, 4658 : 88 - +
  • [29] Empirical analysis of security vulnerabilities in Python packages
    Mahmoud Alfadel
    Diego Elias Costa
    Emad Shihab
    Empirical Software Engineering, 2023, 28
  • [30] NFC Security Analysis and Vulnerabilities in Healthcare Applications
    Alzahrani, Ali
    Alqhtani, Abdullah
    Elmiligi, Haytham
    Gebali, Fayez
    Yasein, Mohamed S.
    2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 302 - 305